You cannot bribe a computer

Issue 1 2023 Access Control & Identity Management, Security Services & Risk Management

Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue, and corruption has become that much easier through technology. Fraud, one of corruption's most prominent faces, thrives thanks to the speed and complexity of our connected world.

However, technology can also help stem fraud and corruption. Identities can help companies radically reduce fraud risks, using automation to swiftly catch and block suspicious identity-related attempts. The growing availability of identity orchestration platforms is good news for the good guys, and devastating news for fraudsters and other criminals.

"The combination of newer technologies have had a big impact on identity verification," says Daniel Robus, Chief Revenue Officer for Contactable "Analytics, automation and artificial intelligence work together on these platforms to give every organisation fraud-fighting abilities."

Technology vs fraud

The connected world has been beneficial to most aspects of business life, even criminal activities. Hacking attacks are rampant, cybercriminals try to infiltrate business systems and steal their data with alarming frequency, and mismanagement of digital assets such as cryptocurrencies have enabled billions of stolen money to disappear.

Worst of all, stolen identities are often a key part of these activities. As our identities are the most common means to access systems, networks or private areas, the incentive to steal them is huge. These stolen identities are then used to contribute to social engineering (techniques to mimic others and abuse that trust), and fuel identity theft activities. Businesses are highly susceptible to this risk, says Robus.

"Every time you verify a customer's details, you are checking if they are a trusted party you can work with. Unfortunately, criminals steal identities so they can abuse that trust. For example, they use someone's details to buy something on credit then disappear with the goods. This trick is not new, but today's digital criminals are becoming more and more creative and are doing this at scale."

There is good news. Technology can also work against them. The European country of Estonia is a living example of this approach. This former Soviet country has been at the forefront of digitisation, recognising technology as a powerful ally to avoid the corruption-heavy problems that dogged former Soviet countries. It placed its state services and databases online, and used automation to help create a transparent environment.

Today, Estonia ranks 14th in Transparency International's Corruption Perceptions Index. None of its East European peers are even in the top thirty. Technology can fight fraud and corruption, and that capability is now available to every type of organisation regardless of size or sector.

Identity platforms fight fraud

Estonia could put the focus and resources of an entire nation behind its anti-corruption efforts. In recent years, digital platform services have made such technologies available to the broader market, powered by new-generation technologies.

"We all use platforms every day to access our emails and to watch our shows," says Robus. "It's very accessible and cost effective, and the platform model creates a level of central control that was previously very hard to run. Platforms also help users take advantage of new technologies as they become relevant. An orchestration platform with identity management at its heart provides a centralised management environment. By consolidating all systems and data sources, the platform can streamline and automate fraud detection and response, making it easier to detect and prevent attacks in real-time."

Platforms are owned and maintained by their creators, but clients access platform services as if they are native to their businesses. The leading platforms integrate with other business systems, such as enterprise security operations centres. A best-of-breed identity platform can integrate with other security systems and tools, such as firewalls, intrusion detection systems, and anti-virus software, to provide a comprehensive view of the security posture and improve overall security. Such platforms also enhance other business functions, including finance processes such as Know Your Customer (KYC) and Anti Money Laundering (AML).

Digital Identity Orchestration platforms use advanced analytics, including machine learning and artificial intelligence, to analyse large data sets, identify patterns and anomalies, and trigger alerts when potential fraud is detected. All this can happen in real time and supports ad-hoc reporting and detailed forensics trails for investigations. Such platforms are becoming essential to all types of organisations.

"I credit two important changes driving more adoption," says Robus "The platform model makes this capability much easier and more affordable to adopt and integrate into a business – not just for business systems, but also the number of people who can use the platform and benefit from its features. The second change is the evolution of technologies such as analytics, connectivity, and data management. Humans no longer have to spend days or weeks trying to uncover fraud. They can find out very quickly and stop the fraud before it causes real damage, or the perpetrators get away."

An Estonian President once quipped, "You cannot bribe a computer. It doesn't know how to accept an envelope." With the correct identity orchestration platform, you cannot easily lie to a computer about your identity or conveniently cover your tracks. Technology can fight fraud thanks to modern digital platforms and advances in analytics, integration, and automation. The only question is how will you use it to reduce your fraud risks?




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...